Preferred Language
Articles
/
nBboCocBVTCNdQwCYDKb
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering inside random text. In the third scenario the encryption process insures a correct restoration of original message. Experimental results show that the proposed cryptosystem works well and secure due to the huge number of fingerprints may be used by attacker to attempt message extraction where all fingerprints but one will give incorrect results and the message will not represent original plain-text, also this method ensures that any intended tamper or simple damage will be discovered due to failure in extracting proper message even if the correct fingerprint are used.

Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
Improved Alternating Direction Implicit Method
...Show More Authors
Abstract<p>The alternating direction implicit method (ADI) is a common classical numerical method that was first introduced to solve the heat equation in two or more spatial dimensions and can also be used to solve parabolic and elliptic partial differential equations as well. In this paper, We introduce an improvement to the alternating direction implicit (ADI) method to get an equivalent scheme to Crank-Nicolson differences scheme in two dimensions with the main feature of ADI method. The new scheme can be solved by similar ADI algorithm with some modifications. A numerical example was provided to support the theoretical results in the research.</p>
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Shadow Removal Using Segmentation Method
...Show More Authors

Shadow detection and removal is an important task when dealing with color outdoor images. Shadows are generated by a local and relative absence of light. Shadows are, first of all, a local decrease in the amount of light that reaches a surface. Secondly, they are a local change in the amount of light rejected by a surface toward the observer. Most shadow detection and segmentation methods are based on image analysis. However, some factors will affect the detection result due to the complexity of the circumstances. In this paper a method of segmentation test present to detect shadows from an image and a function concept is used to remove the shadow from an image.

View Publication Preview PDF
Publication Date
Thu Dec 20 2007
Journal Name
Journal Of Planner And Development
The Weighted Index Number Method
...Show More Authors

The process of identifying the region is not an easy process when compared with other operations within the attribute or similarity. It is also not difficult if the process of identifying the region is based on the standard and standard indicators in its calculation. The latter requires the availability of numerical and relative data for the data of each case Any indicator or measure is included in the legal process

View Publication Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Cytotoxic effects of new synthesis heterocyclic derivatives of Amoxicillin on some cancer cell lines
...Show More Authors

A new Schiff base [I] was prepared by refluxing Amoxicillin trihydrate and 4-Hydroxy- 3,5-dimethoxybenzaldehyde in aqueous methanol solution using glacial acetic acid as a catalyst. The new 1,3-oxazepine derivative [II] was obtained by Diels- Alder reaction of Schiff base [I] with phthalic anhydride in dry benzene. The reaction of Schiff base [I] with thioglycolic acid in dry benzene led to the formation of thiazolidin-4-one derivative [III]. While the imidazolidin-4-one [IV] derivative was produced by reacting the mentioned Schiff base [I] with glycine and triethylamine in ethanol for 9 hrs. Tetrazole derivative [V] was synthesized by refluxing Schiff base [I] with sodium azide in dimethylformamid DMF. The structure of synthesized compound

... Show More
Scopus (18)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 12 2013
Journal Name
International Journal Of Engineering Sciences And Research Technology
Synthesis, Characterization of New Azo Compounds and Studies Effect on the Ach Enzyme(Invitro)
...Show More Authors

Three azo compounds were synthesized in two different methods, and characterized by FT-IR, HNMR andVis) spectra, melting points were determined. The inhibitory effects of prepared compounds on the activity of human serum cholinesterase have been studied in vitro. Different concentrations of study the type of inhibition. The results form line weaver-Burk plot indicated that the inhibitor type was noncompetitive with a range (33.12-78.99%).

Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
PART 3 New Experiments Three Factors On The Box plot, Box notch & Outlier Values
...Show More Authors

New two experiments of the three factors, in this study were constructed to investigate the effects, of the fixed variations to the box plot on subjects' judgments of the box lengths. These two experiments were constructed as an extension to the group B experiments, the ratio experiments the experiments with two variables carried out previously by Hussin, M.M. (1989, 2006, 2007). The first experiment box notch experiment, and the second experiment outlier values experiment. Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box lengths and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
ON A NEW CESTODE FROM THE AVOCET RECUR VIROSTRA AVOCETTA L. COLLECTED IN IRAQ
...Show More Authors

Several specimens of the avocet, Recurvirostra avocetta L. are found infected with
Himantocestus gigantivcus sp. nov. ( Cestoda , Diploposthidae) . This cestode is related to H.
blanksoni Ukoli 1965 but easily differentiated from it in having longer and wider strobila,
larger size of testes but lesser in number, cirrus situated in the middle of mature segment
histead of anterior third and slightly posterior to the middle in gravid segment instead of the
middle , ovary and vitelline gland are larger , and the uterus has more branches.

View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Designand Implementation of New DES64X and DES128X on 32, 64 Bit Operating System Environments
...Show More Authors

In this paper, a description of a design for new DES block cipher, namely DES64X and DES128X. The goals of this design, a part of its security level, are large implementation flexibility on various operating systems as well as high performances. The high level structure is based on the principle of DES and Feistel schema, and proposes the design of an efficient key-schedule algorithm which will output pseudorandomsequences of subkeys. The main goal is to reach the highest possible flexibility, in terms of round numbers, key size, and block size. A comparison of the proposed systems on 32-bit, 64-bit operating system, using 32-bit and 64-bit Java Virtual Machine (JVM), showed that the latter has much better performance than the former.

... Show More
View Publication Preview PDF